CLOUD MANAGEMENT CONNECTIVITY ASSURANCE
    11.
    发明申请

    公开(公告)号:US20200351160A1

    公开(公告)日:2020-11-05

    申请号:US16929519

    申请日:2020-07-15

    Abstract: The disclosed technology relates a system is configured to generate a protected configuration for a network device based on network connectivity data for a plurality of devices in a managed network associated with a cloud management system. The system is further configured to receive a configuration change for the managed network, determine that the configuration change is incompatible with the protected configuration, and generate a notification that the configuration change is incompatible with the protected configuration.

    SEAMLESS AUTOMATION OF NETWORK DEVICE MIGRATION TO AND FROM CLOUD MANAGED SYSTEMS

    公开(公告)号:US20200162318A1

    公开(公告)日:2020-05-21

    申请号:US16399304

    申请日:2019-04-30

    Abstract: The present technology is directed to an automated end to end network migration process from on-premise to cloud-based management platforms and visa-versa. The disclosed technology describes an enhanced plug and play (PnP) software agent operationally coupled to a device and capable of interacting with a PnP service hosted on a target management platform to thereby initiate the migration process. The PnP service on the target management platform upon receiving a migration request from the device PnP agent, maps the requesting device onto a client profile existing on the target management platform and identifies therefrom the associated default controller for the device. Subsequently, the device is directed to acquire and boot up on a new software image compatible with the target management platform and following a conversion of its existing configuration into a version compatible with the new software image, the device is migrated to the associated default controller.

    System, method, apparatus and machine-readable media for enterprise wireless calling

    公开(公告)号:US10341300B2

    公开(公告)日:2019-07-02

    申请号:US15044957

    申请日:2016-02-16

    Abstract: Embodiments include receiving one or more packets of a Wi-Fi calling session via a secure tunnel from a user device, where the user device is connected to a source network via a Wi-Fi access point. Embodiments also include determining whether the Wi-Fi calling session is a threat based, at least in part, on identifying an anomaly of at least one packet of the one or more packets. An action can be taken if the Wi-Fi calling communication is determined to be a threat. More specific embodiments include determining the at least one packet is associated with the Wi-Fi calling session by correlating information in the packet with control plane data of the Wi-Fi calling session. Further embodiments can include intercepting the one or more packets in a second secure tunnel established between an evolved packet data gateway and a service provider network associated with the user device.

    SYSTEM AND METHOD FOR PROVIDING HANDOVER TO AN AMBIGUOUS SMALL CELL ACCESS POINT IN A NETWORK ENVIRONMENT

    公开(公告)号:US20150358872A1

    公开(公告)日:2015-12-10

    申请号:US14302086

    申请日:2014-06-11

    CPC classification number: H04W36/0072 H04W36/04 H04W84/045

    Abstract: An example method is provided in one example embodiment and includes receiving a request to relocate a user equipment (UE) from a source macro radio to an ambiguous small cell access point (AP), wherein the request includes a target cell identity (ID) encoded with a source macro cell identifier for the source macro radio and a target sub-carrier identifier for the ambiguous small cell AP; determining potential target small cell APs for relocation of the first UE using the using the first target cell ID, wherein each of the potential target small cell APs are within a coverage area of the source macro radio and operate using the target sub-carrier identifier; and preparing, for each of the potential target small cell APs, a common channel to receive relocation of the first UE. The first UE can relocate to a particular target small cell access point using the common channel.

    Expended trust for onboarding
    17.
    发明授权

    公开(公告)号:US11528273B2

    公开(公告)日:2022-12-13

    申请号:US17153080

    申请日:2021-01-20

    Abstract: In one embodiment, an IoT server includes: processing circuitry, an I/O module operative to communicate with at least an IoT device and a vendor network server, and an onboarding application and operative to at least: receive an onboarding request from the IoT device via the I/O module, send a confirmation request to the vendor network server via the I/O module, where the confirmation request indicates a request to confirm an identity of the IoT device according to a connection to a network device authenticated by the vendor network server, receive a confirmation response from the vendor network server via the I/O module, where the confirmation response indicates whether the IoT device is connected to the network device, and if the confirmation response is a positive confirmation response that indicates that the IoT device is connected to the network device, onboard the IoT device for participation in an IoT-based system.

    Machine learning-based application posture for zero trust networking

    公开(公告)号:US11411958B2

    公开(公告)日:2022-08-09

    申请号:US16251654

    申请日:2019-01-18

    Abstract: In one embodiment, a gateway to a zero trust network applies an access control policy to an endpoint device attempting to access a cloud-based application hosted by the zero trust network. The gateway acts as a reverse proxy between the endpoint device and the cloud-based application, based on the access control policy applied to the endpoint device. The gateway captures telemetry data regarding application traffic reverse proxied by the gateway between the endpoint device and the cloud-based application. The gateway detects an anomalous behavior of the application traffic by comparing the captured telemetry data to a machine learning-based behavioral model for the application. The gateway initiates a mitigation action for the detected anomalous behavior of the application traffic.

Patent Agency Ranking